Analysis

  • max time kernel
    185s
  • max time network
    206s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-11-2022 13:29

General

  • Target

    ce36e5e77d9501f5892c8d825104738ded2f9d7ab2074af51714e86c18894a44.exe

  • Size

    708KB

  • MD5

    ecb6e0b8c1c969fb81be1b5d52ea4bab

  • SHA1

    aa7d5a7a84f7a2b24d5177bfc147561964d0a250

  • SHA256

    ce36e5e77d9501f5892c8d825104738ded2f9d7ab2074af51714e86c18894a44

  • SHA512

    4bb4313c268de141113f70a485b4af341ba4130329c4a9d1c734b2a1e0982e4f5da6097765bc7352bd5f7cf34f48b1b68f62d996144c5c7bd3153c0533d45b48

  • SSDEEP

    12288:NGcpdQGrhJFun+3L04NtfzaAixx2L6sqyHdUPsjIPF81DLAIM:ND2Grg+I4Ntfzay3UMiFay

Malware Config

Extracted

Family

warzonerat

C2

bedahogs.100chickens.me:6093

Signatures

  • WarzoneRat, AveMaria

    WarzoneRat is a native RAT developed in C++ with multiple plugins sold as a MaaS.

  • Warzone RAT payload 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ce36e5e77d9501f5892c8d825104738ded2f9d7ab2074af51714e86c18894a44.exe
    "C:\Users\Admin\AppData\Local\Temp\ce36e5e77d9501f5892c8d825104738ded2f9d7ab2074af51714e86c18894a44.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4600
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\REQUEST-QUOTATION.GIF
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1036
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1036 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4192
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Spotify\Spotify.vbs"
      2⤵
      • Adds Run key to start application
      PID:1784
    • C:\Users\Admin\AppData\Local\Temp\Spotify\Spotify.scr
      "C:\Users\Admin\AppData\Local\Temp\Spotify\Spotify.scr" /S
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3224
      • C:\Users\Admin\AppData\Local\Temp\Spotify\Spotify.scr
        C:\Users\Admin\AppData\Local\Temp\Spotify\Spotify.scr" /S
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:4508
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe"
          4⤵
            PID:364

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\REQUEST-QUOTATION.GIF

      Filesize

      11KB

      MD5

      278956f711ed61cbd3c2823479ff8d1f

      SHA1

      6c13dc9edbc8d32785161a656416ec05e90b6012

      SHA256

      cab4061a6c121e1e6223c87c53b016fa0087236453a6b1e449efbf6571a19c92

      SHA512

      29874611477a5c704d2a911e384221542cb27e6b1d887be99d95fba97d50e5151f8007e1df96052595df5ef53367659b5191c2e0ea13bfb216f76afbd473f489

    • C:\Users\Admin\AppData\Local\Temp\Spotify\Spotify.scr

      Filesize

      708KB

      MD5

      ecb6e0b8c1c969fb81be1b5d52ea4bab

      SHA1

      aa7d5a7a84f7a2b24d5177bfc147561964d0a250

      SHA256

      ce36e5e77d9501f5892c8d825104738ded2f9d7ab2074af51714e86c18894a44

      SHA512

      4bb4313c268de141113f70a485b4af341ba4130329c4a9d1c734b2a1e0982e4f5da6097765bc7352bd5f7cf34f48b1b68f62d996144c5c7bd3153c0533d45b48

    • C:\Users\Admin\AppData\Local\Temp\Spotify\Spotify.scr

      Filesize

      708KB

      MD5

      ecb6e0b8c1c969fb81be1b5d52ea4bab

      SHA1

      aa7d5a7a84f7a2b24d5177bfc147561964d0a250

      SHA256

      ce36e5e77d9501f5892c8d825104738ded2f9d7ab2074af51714e86c18894a44

      SHA512

      4bb4313c268de141113f70a485b4af341ba4130329c4a9d1c734b2a1e0982e4f5da6097765bc7352bd5f7cf34f48b1b68f62d996144c5c7bd3153c0533d45b48

    • C:\Users\Admin\AppData\Local\Temp\Spotify\Spotify.scr

      Filesize

      708KB

      MD5

      ecb6e0b8c1c969fb81be1b5d52ea4bab

      SHA1

      aa7d5a7a84f7a2b24d5177bfc147561964d0a250

      SHA256

      ce36e5e77d9501f5892c8d825104738ded2f9d7ab2074af51714e86c18894a44

      SHA512

      4bb4313c268de141113f70a485b4af341ba4130329c4a9d1c734b2a1e0982e4f5da6097765bc7352bd5f7cf34f48b1b68f62d996144c5c7bd3153c0533d45b48

    • C:\Users\Admin\AppData\Local\Temp\Spotify\Spotify.vbs

      Filesize

      1024B

      MD5

      c8aec1dc4775b2f9bfb3944b596bcfa1

      SHA1

      5b6188ac37ab8b6a0ef4ffea82a284abc5d40898

      SHA256

      3fb9caeff6259d6131fc1b43d57d6409866ce5541313098d8471b694d7996264

      SHA512

      e350218d945b9b1166c0404cdc50930d9bc89391bc19f8eb562692394270543c02076d29db900b440c96110ac0d2c03a63335320d4da352730875c7c8dc82e4e

    • memory/364-167-0x0000000000320000-0x0000000000321000-memory.dmp

      Filesize

      4KB

    • memory/3224-152-0x00000000029B0000-0x00000000029B7000-memory.dmp

      Filesize

      28KB

    • memory/3224-153-0x00007FF9E57F0000-0x00007FF9E59E5000-memory.dmp

      Filesize

      2.0MB

    • memory/3224-154-0x0000000077330000-0x00000000774D3000-memory.dmp

      Filesize

      1.6MB

    • memory/4508-162-0x00007FF9E57F0000-0x00007FF9E59E5000-memory.dmp

      Filesize

      2.0MB

    • memory/4508-163-0x0000000077330000-0x00000000774D3000-memory.dmp

      Filesize

      1.6MB

    • memory/4508-165-0x0000000077330000-0x00000000774D3000-memory.dmp

      Filesize

      1.6MB

    • memory/4508-164-0x0000000000500000-0x0000000000507000-memory.dmp

      Filesize

      28KB

    • memory/4508-156-0x0000000000400000-0x000000000041D000-memory.dmp

      Filesize

      116KB

    • memory/4508-155-0x0000000000400000-0x00000000004B6000-memory.dmp

      Filesize

      728KB

    • memory/4600-134-0x0000000002190000-0x0000000002197000-memory.dmp

      Filesize

      28KB

    • memory/4600-145-0x00007FF9E57F0000-0x00007FF9E59E5000-memory.dmp

      Filesize

      2.0MB

    • memory/4600-139-0x0000000077330000-0x00000000774D3000-memory.dmp

      Filesize

      1.6MB

    • memory/4600-138-0x00007FF9E57F0000-0x00007FF9E59E5000-memory.dmp

      Filesize

      2.0MB

    • memory/4600-146-0x0000000077330000-0x00000000774D3000-memory.dmp

      Filesize

      1.6MB

    • memory/4600-137-0x0000000002190000-0x0000000002197000-memory.dmp

      Filesize

      28KB

    • memory/4600-136-0x0000000077330000-0x00000000774D3000-memory.dmp

      Filesize

      1.6MB

    • memory/4600-135-0x00007FF9E57F0000-0x00007FF9E59E5000-memory.dmp

      Filesize

      2.0MB